DataBreachToday.com
React Flaw Mitigation Leads to Cloudflare Outage
10 hours 37 minutes ago
Outage Briefly Took Down Zoom, LinkedIn and Other Websites
Content delivery network giant Cloudflare is investigating a brief outage early Friday that took down multiple websites. The incident marks the second outage in the span of a month, although the causes are unrelated. It stemmed from how Cloudflare's web application firewall parses requests.
Content delivery network giant Cloudflare is investigating a brief outage early Friday that took down multiple websites. The incident marks the second outage in the span of a month, although the causes are unrelated. It stemmed from how Cloudflare's web application firewall parses requests.
No Vote, No Leader: CISA Faces 2026 Without a Director
10 hours 37 minutes ago
US Cyber Defense Agency Faces Procedural Delays Blocking Director Confirmation
Sean Plankey's stalled nomination leaves the Cybersecurity and Infrastructure Security Agency without a Senate-confirmed director amid rising state-linked threats, as unrelated congressional holds tied to telecom and contracting fights freeze the process with no resolution in sight.
Sean Plankey's stalled nomination leaves the Cybersecurity and Infrastructure Security Agency without a Senate-confirmed director amid rising state-linked threats, as unrelated congressional holds tied to telecom and contracting fights freeze the process with no resolution in sight.
23andMe to Get $16.5M in Unused Cyber Insurance
10 hours 37 minutes ago
Bankrupt Firm Plans to Use the Settlement Money to Pay Off Cyber Claims
As part of its ongoing Chapter 11 bankruptcy proceedings, 23andMe Holding Co. - now named Chrome Holding - has reached a settlement with its cyber insurers for the carriers to buy back $16.5 million of the consumer genetics testing firm's unused cyber policy. What will the company do with the funds?
As part of its ongoing Chapter 11 bankruptcy proceedings, 23andMe Holding Co. - now named Chrome Holding - has reached a settlement with its cyber insurers for the carriers to buy back $16.5 million of the consumer genetics testing firm's unused cyber policy. What will the company do with the funds?
Rethinking the CIO-CISO Dynamic in the Age of AI
10 hours 37 minutes ago
Enterprises Are Reimagining Org Roles, Risk Management and Skillsets in the AI Race
Organizations are beginning to reimagine how leadership roles should be structured, aligned and empowered as they grapple with regulatory pressures, the unpredictable nature of AI systems, and the need for operational resilience in an increasingly uncertain business climate.
Organizations are beginning to reimagine how leadership roles should be structured, aligned and empowered as they grapple with regulatory pressures, the unpredictable nature of AI systems, and the need for operational resilience in an increasingly uncertain business climate.
Breach Roundup: React Flaw Incites Supply Chain Risk
1 day 3 hours ago
Also, Microsoft Badly Patches LNK Flaw, Australian Sentenced for 'Evil Twin' Hack
This week, the React flaw, a belated Windows fix, Defense Secretary Pete Hegseth's Signal group posed operational risk, more North Korean npm packages. An Australian jailed for Wi-Fi "evil twin" crimes. The US FTC will send $15.3 million to Avast users. A London council said attackers stole data.
This week, the React flaw, a belated Windows fix, Defense Secretary Pete Hegseth's Signal group posed operational risk, more North Korean npm packages. An Australian jailed for Wi-Fi "evil twin" crimes. The US FTC will send $15.3 million to Avast users. A London council said attackers stole data.
Brickstorm Malware Hits US Critical Systems, CISA Warns
1 day 3 hours ago
Chinese-Linked Malware Campaign Targets Critical Environments With Weak Monitoring
U.S. and Canadian cyber authorities say Chinese state-backed actors used a backdoor dubbed BRICKSTORM to maintain long-term access into critical infrastructure, exploiting VMware environments to exfiltrate credentials and evade detection through encrypted covert channels.
U.S. and Canadian cyber authorities say Chinese state-backed actors used a backdoor dubbed BRICKSTORM to maintain long-term access into critical infrastructure, exploiting VMware environments to exfiltrate credentials and evade detection through encrypted covert channels.
HHS Outlines AI Road Map Amid Major Department Overhaul
1 day 3 hours ago
Plan Aims to Modernize Workflow, Expand AI Use Across Agencies, Improve Cyber
The U.S. Department of Health and Human Services on Thursday unveiled "version 1" of a strategic plan to implement artificial intelligence as a "practical layer" across the department and its agencies aimed at helping to break down silos, improve collaboration and increase efficiencies.
The U.S. Department of Health and Human Services on Thursday unveiled "version 1" of a strategic plan to implement artificial intelligence as a "practical layer" across the department and its agencies aimed at helping to break down silos, improve collaboration and increase efficiencies.
UK Government Considers Computer Misuse Act Revision
1 day 3 hours ago
Security Minister Dan Jarvis Endorses Security Researcher Protections
The U.K. government is considering amending its three-decade-old hacking law to include a "statutory defense" cover for security researchers. The announcement comes amid concerns that the law penalizes white hat hackers for essential security practices.
The U.K. government is considering amending its three-decade-old hacking law to include a "statutory defense" cover for security researchers. The announcement comes amid concerns that the law penalizes white hat hackers for essential security practices.
When ERP Systems Become the Attack Surface
2 days 9 hours ago
Skills Needed: Enterprise Architecture, Configuration and Vulnerability Management
When a critical vulnerability surfaces in ERP systems such as the Oracle E-Business Suite flaw, attackers can go well beyond a single compromised server. The flaw exposed the need for cyber professionals who understand enterprise architecture, secure configuration and vulnerability interpretation.
When a critical vulnerability surfaces in ERP systems such as the Oracle E-Business Suite flaw, attackers can go well beyond a single compromised server. The flaw exposed the need for cyber professionals who understand enterprise architecture, secure configuration and vulnerability interpretation.
Utilities Warn US Grid at Risk as Federal Cyber Funds Dry Up
2 days 9 hours ago
Federal Cuts Threaten Grid Security as Nation-State Hackings Escalate, Analysts Say
Cybersecurity leaders told Congress that U.S. energy systems are already compromised by state-backed actors - chiefly China - and warned that shrinking federal support for grid security programs threatens to worsen exposure as utilities face escalating threats with limited resources.
Cybersecurity leaders told Congress that U.S. energy systems are already compromised by state-backed actors - chiefly China - and warned that shrinking federal support for grid security programs threatens to worsen exposure as utilities face escalating threats with limited resources.
CISA Warns of Severe Flaws in Nuclear Med Tracking Software
2 days 9 hours ago
Mirion Medical Says Bugs Are Fixed in New Release of BioDose/NMIS Software
U.S. federal authorities are warning that several high-severity vulnerabilities discovered in Mirion Medical Co. inventory tracking software used by nuclear medicine departments could allow attackers to modify program executables and gain access to sensitive information.
U.S. federal authorities are warning that several high-severity vulnerabilities discovered in Mirion Medical Co. inventory tracking software used by nuclear medicine departments could allow attackers to modify program executables and gain access to sensitive information.
Scaling AI From Copilots to Agentic Workflows
2 days 16 hours ago
Organizations are adopting agentic artificial intelligence as the next phase of AI. Kim Basile, CIO of Kyndryl, explains how organizations can prepare teams to work with agentic AI, emphasizing culture, training and governance as the crucial drivers of AI readiness and adoption.
China Skirts US Attempts to Restrict AI Exports
2 days 16 hours ago
China Still Relies on US Technology, Experts tell Senate
Washington spent years constructing export barriers around America's most sensitive artificial intelligence technology. Witnesses told the U.S. Senate Foreign Relations Committee that China is finding ways to move around them. Where one pathway closes, Beijing opens another.
Washington spent years constructing export barriers around America's most sensitive artificial intelligence technology. Witnesses told the U.S. Senate Foreign Relations Committee that China is finding ways to move around them. Where one pathway closes, Beijing opens another.
Codex Bug Let Repo Files Execute Hidden Commands
2 days 16 hours ago
Attackers Could Hijack Developer Machines via Tampered Config Files
OpenAI patched a command injection flaw in its Codex CLI tool that let attackers run arbitrary commands on developer machines by hiding malicious configuration files inside code repositories. Hackers could turn ordinary repository files into execution vectors.
OpenAI patched a command injection flaw in its Codex CLI tool that let attackers run arbitrary commands on developer machines by hiding malicious configuration files inside code repositories. Hackers could turn ordinary repository files into execution vectors.
AWS: Shifting From Cloud-Based Apps to an Agentic AI Cloud
2 days 18 hours ago
CEO Matt Garman Shares Plans for Developing Billions of Autonomous Agents
For two decades, AWS has been the undisputed leader in cloud computing, but listening to AWS CEO Matt Garman at the re:Invent 2025 conference, the future isn't in the infrastructure layer. Garman envisions a fundamental shift from applications in the cloud to a cloud of autonomous AI agents.
For two decades, AWS has been the undisputed leader in cloud computing, but listening to AWS CEO Matt Garman at the re:Invent 2025 conference, the future isn't in the infrastructure layer. Garman envisions a fundamental shift from applications in the cloud to a cloud of autonomous AI agents.
Australia Abandons Proposed Mandatory AI Rules in New Plan
3 days 8 hours ago
Government Opts for Voluntary Frameworks Over Enforceable Safeguards
Australia's federal government has quietly shelved the mandatory AI guardrails it proposed just three months ago, replacing enforceable requirements with voluntary guidance in its National AI Plan released today.
Australia's federal government has quietly shelved the mandatory AI guardrails it proposed just three months ago, replacing enforceable requirements with voluntary guidance in its National AI Plan released today.
Webinar | The Naked Truth: Your AD Is Exposed and Recovery is Too Slow
3 days 8 hours ago
Webinar | The Future of Privilege: One Platform, Every Environment
3 days 8 hours ago
South Korean E-Commerce Giant Coupang Probes Massive Breach
3 days 8 hours ago
Chinese Developer Formerly Employed by Company Suspected of Data Theft
South Korea's biggest online retailer, Coupang, said a five-month breach exposed personal data pertaining to 34 million customers, and only came to light after it received an extortion demand. Police said a former developer at the company, a Chinese national who fled the country, is a suspect.
South Korea's biggest online retailer, Coupang, said a five-month breach exposed personal data pertaining to 34 million customers, and only came to light after it received an extortion demand. Police said a former developer at the company, a Chinese national who fled the country, is a suspect.
Checked
10 hours 37 minutes ago
DataBreachToday.com RSS News Feeds on data breach today news, regulations, blogs and education
DataBreachToday.com feed